1 Which transport layer protocol provides low overhead and
would be used for applications which do not require reliable data delivery?
TCP
IP
UDP
HTTP
DNS
2 What are two
features of the User Datagram Protocol (UDP)? (Choose two.)
flow control
low overhead
connectionless
connection-oriented
sequence and acknowledgements
3 What mechanism is
used by TCP to provide flow control as segments travel from source to
destination?
sequence numbers
session establishment
window size
acknowledgments
4 What is dynamically selected by the source host when
forwarding data?
destination logical address
source physical address
default gateway address
source port
5 Why are port
numbers included in the TCP header of a segment?
to indicate the correct router interface that should be used
to forward a segment
to identify which switch ports should receive or forward the
segment
to determine which Layer 3 protocol should be used to
encapsulate the data
to enable a receiving host to forward the data to the
appropriate application
to allow the receiving host to assemble the packet in the
proper order
6 Which two options
represent Layer 4 addressing? (Choose two.)
identifies the destination network
identifies source and destination hosts
identifies the communicating applications
identifies multiple conversations between the hosts
identifies the devices communicating over the local media
7 Which three
features allow TCP to reliably and accurately track the transmission of data
from source to destination?
encapsulation
flow control
connectionless services
session establishment
numbering and sequencing
best effort delivery
8 Which OSI model
layer is responsible for regulating the flow of information from source to
destination, reliably and accurately?
application
presentation
session
transport
network
9 Which event occurs during the transport layer three-way
handshake?
The two applications exchange data.
TCP initializes the sequence numbers for the sessions.
UDP establishes the maximum number of bytes to be sent.
The server acknowledges the bytes of data received from the
client.
10 Refer to the exhibit. Host A is using FTP to download a
large file from Server 1. During the download process, Server 1 does not
receive an acknowledgment from Host A for several bytes of transferred data.
What action will Server 1 take as a result?
create a Layer 1 jam signal
reach a timeout and resend the data that needs to be
acknowledged
send a RESET bit to the host
change the window size in the Layer 4 header.
11 Refer to the exhibit. Host1 is in the process of setting up
a TCP session with Host2. Host1 has sent a SYN message to begin session
establishment. What happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to
Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to
Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to
Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to
Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to
Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to
Host1.
12 Both switches and hubs are being utilized within the
TestKing network. Which of the following is true regarding the use of switches and hubs
for network connectivity in this network?
A. Switches take less time to process frames than hubs take
B. Hubs can filter frames
C. Switches do not forward broadcasts
D. Switches increase the number of collision domains in the
network
E. Using hubs can increase the amount of bandwidth available
to hosts
F. None of the above.
13 Which one of the following characteristics is true
regarding the use of hubs and switches?
A. Hubs can have their ports be configured with VLANs
B. Using hubs is costly with regard to bandwidth
availability.
C. Switches can not forward broadcasts
D. Switches are more efficient than hubs in processing
frames.
E. Switches increase the number of collision domains in the
network
14 When comparing and contrasting the similarities and
differences between bridges and switches, which of the following are valid statements?
Choose all the valid answer choices)
A. Bridges are faster than switches because they have fewer
ports.
B. A switch is a multiport bridge,
C. Bridges and switches learn MAC addresses by examining the
source MAC address of
each frame received.
D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision
domain.
F. None of the above statements are true.
15 Which of the following correctly describe the various
functions and virtues of a router? (Select all valid answer choices)
A. Packet switching
B. Collision prevention on a LAN segment.
C. Packet filtering
D. Broadcast domain enlargement
E. Broadcast forwarding
F. Internetwork communication
G. None of the above
16 The LAN needs are expanding at the Testking corporate
office, which is quickly growing You are instructed to enlarge the area covered by a
single LAN segment on the company network. Which of the following are layer 1 devices that you can use?
(Choose all that apply.)
A. A switch
B. A router
C. A network adapter card
D. A hub
E. A repeater
17 Cisco is the leader in the router market space. What
basic functions do their routers perform in a network? (Choose two)
A. The microsegmentation of broadcast domains
B. Path selection
C. Packet switching
D. Bridging between LAN segments
E. Access layer security
F. VLAN membership assignment
G. Application optimization
18 Both bridges are switches are being used throughout the
TestKing LAN. Which of the following statements are true regarding bridges and
switches in this network? (Choose 3)
A. Switches are primarily software based while bridges are
hardware based.
B. Switches usually have a higher number of ports than most
bridges.
C. Bridges are frequently faster than switches.
D. Bridges define broadcast domains while switches define
collision domains.
E. Both bridges and switches forward Layer 2 broadcasts.
F. Both bridges and switches make forwarding decisions based
on Layer 2 addresses
19 As a network administrator, you will need to decide on
the appropriate network devices to use. Which of the following correctly describes
the roles of devices in a WAN? (Choose three)
A. A CSU/DSU terminates a digital local loop.
B. A router is commonly considered a DCE device.
C. A modem terminates an analog local loop.
D. A router is commonly considered a DTE device.
E. A modem terminates a digital local loop.
20 As a CCNA candidate, you must know the various layers of
the OSI model. At which layers of the OSI Model do Wide Area Networks operate
in? (Choose two)
A. Physical Layer
B. Datalink Layer
C. Network Layer
D. Session Layer
E. Transport Layer
F. Presentation Layer
G. Application Layer
21 While troubleshooting a connectivity problem on the
network, you issue the ping command from your PC command prompt, but the output shows
"request times out." At which OSI layer is this problem associated with?
A. The data link layer
B. The application layer
C. The access layer
D. The session layer
E. The network layer
22 You download a file from an FTP site on the Internet.
What is the highest layer in the OSI model used in this FTP operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data Link
G. Physical
23 A host computer has been correctly configured with a
static IP address, but the default gateway is incorrectly set. Which layer of the OSI
model will be first affected by this configuration error?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
E. Layer 7
24 Which layer of the OSI reference model is responsible for
ensuring reliable end-to-end delivery of data?
A. Application
B. Presentation
C. Session
D. Transport
E. Network
F. Data-Link
25 At which OSI layer is a logical path created between two
host systems named TK1 and TK2 on the company LAN?
A. Physical
B. Session
C. Data link
D. Transport
E. Network
F. Application
G. Presentation
26 Which OSI layer is associated with the following: The
acknowledgement of transmissions, sequencing, and flow control across a
network?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7
27 Which OSI layer header contains the address of a
destination host that is on another network?
A. Application
B. Presentation
C. Session
D. Transport
E. Network
F. Data link
G. Physical
28 Which of the following correctly describe steps in the
OSI data encapsulation process? (Choose two)
A. The presentation layer translates bits into voltages for
transmission across the physical
link.
B. The transport layer divides a data stream into segments
and adds reliability and flow control information.
C. Packets are created when the network layer adds Layer 3
addresses and control information to a segment.
D. The data link layer adds physical source and destination
addresses and an FCS to the
segment.
E. Packets are created when the network layer encapsulates a
frame with source and
destination host addresses and protocol-related control
information.
29 When files are transferred between a host and an FTP
server, the data is divided into smaller pieces for transmission. As these pieces arrive
at the destination host, they must be reassembled to reconstruct the original file.
What provides for the reassembly of these pieces into the correct order?
A. The sequence number in the TCP header
B. The Start Frame Delimiter in the 802.3 Preamble
C. The TTL in the IP header
D. The acknowledgement number in the segment header
E. The frame check sequence in the Ethernet frame trailer
30 Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?
All three networks use CSMA/CA
None of the networks require media access control.
Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.
Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.
30 Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?
All three networks use CSMA/CA
None of the networks require media access control.
Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.
Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.
31 Which options are properties of contention-based media
access for a shared media? (Choose three.)
non-deterministic
less overhead
one station transmits at a time
collisions exist
devices must wait their turn
token passing
32 What is a primary
purpose of encapsulating packets into frames?
provide routes across the internetwork
format the data for presentation to the use
facilitate the entry and exit of data on media
identify the services to which transported data is
associated
33 What is true concerning physical and logical topologies?
The logical topology is always the same as the physical
topology.
Physical topologies are concerned with how a network
transfers frames.
Physical signal paths are defined by Data Link layer
protocols.
Logical topologies consist of virtual connections between
nodes.
34 What are three
characteristics of valid Ethernet Layer 2 addresses? (Choose three.)
They are 48 binary bits in length.
They are considered physical addresses.
They are generally represented in hexadecimal format.
They consist of four eight-bit octets of binary numbers.
They are used to determine the data path through the
network.
They must be changed when an Ethernet device is added or
moved within the network.
35 What determines the method of media access control?
(Choose two.)
network layer addressing
media sharing
application processes
logical topology
intermediary device function
36 What is the purpose of the preamble in an Ethernet frame?
is used as a pad for data
identifies the source address
identifies the destination address
marks the end of timing information
is used for timing synchronization with alternating patterns
of ones and zeros
37 What statements are true regarding addresses found at
each layer of the OSI model? (Choose two.)
Layer 2 may identify devices by a physical address burned
into the network card
Layer 2 identifies the applications that are communicating
Layer 3 represents a hierarchical addressing scheme
Layer 4 directs communication to the proper destination
network
Layer 4 addresses are used by intermediary devices to
forward data
38 Which statements describe the logical token-passing
topology? (Choose two.)
Network usage is on a first come, first serve basis.
Computers are allowed to transmit data only when they
possess a token.
Data from a host is received by all other hosts.
Electronic tokens are passed sequentially to each other.
Token passing networks have problems with high collision
rates.
39 Which sublayer of the data link layer prepares a signal
to be transmitted at the physical layer?
LLC
MAC
HDLC
NIC
40 What is true
regarding media access control? (Choose three.)
Ethernet utilizes CSMA/CD
defined as placement of data frames on the media
contention-based access is also known as deterministin
802.11 utilizes CSMA/CD
Data Link layer protocols define the rules for access to
different media
controlled access contains data collisions
41 What is a characteristic of a logical point-to-point
topology?
The nodes are physically connected.
The physical arrangement of the nodes is restricted.
The media access control protocol can be very simple.
The data link layer protocol used over the link requires a
large frame header.
42 What two facts are true when a device is moved from one
network or subnet to another? (Choose two.)
The Layer 2 address must be reassigned.
The default gateway address should not be changed.
The device will still operate at the same Layer 2 address.
Applications and services will need additional port numbers
assigned.
The Layer 3 address must be reassigned to allow
communications to the new network.
43 What is a function of the data link layer?
provides the formatting of data
provides end-to-end delivery of data between hosts
provides delivery of data between two applications
provides for the exchange data over a common local media
44 Which three factors should be considered when
implementing a Layer 2 protocol in a network? (Choose three.)
the Layer 3 protocol selected
the geographic scope of the network
the PDU defined by the transport layer
the physical layer implementation
the number of hosts to be interconnected
45 What is the primary purpose of the trailer in a data link
layer frame?
define the logical topology
provide media access control
support frame error detection
carry routing information for the frame
46 A network administrator has been asked to provide a
graphic representation of exactly where the company network wiring and
equipment are located in the building. What is this type of drawing?
logical topology
physical topology
cable path
wiring grid
access topology
47 How many bits make up an IPv4 address?
128
64
48
32
48 In an IPv4 environment, what information is used by the
router to forward data packets from one interface of a router to another?
destination network address
source network address
source MAC address
well known port destination address
49 What information is added during encapsulation at OSI
Layer 3?
source and destination MAC
source and destination application protocol
source and destination port number
source and destination IP address
50 In a connectionless system, which of the following is
correct?
The destination is contacted before a packet is sent.
The destination is not contacted before a packet is sent.
The destination sends an acknowledgement to the source that
indicates the packet was received.
The destination sends an acknowledgement to the source that
requests the next packet to be sent.